Due to a weak Content Security Policy on the /proxy/* route, an attacker can bypass the CSP of the media proxy and execute cross-site scripting when opening external images in a new tab/window.
A malicious feed added to Miniflux can execute arbitrary JavaScript in the user's browser when opening external resources, such as proxified images, in a new tab or window.
The CSP for the media proxy has been changed from default-src 'self' to default-src 'none'; form-action 'none'; sandbox;.
Upgrade to Miniflux >= 2.2.7
RyotaK (GMO Flatt Security Inc.) with takumi-san.ai
{
"severity": "MODERATE",
"nvd_published_at": "2025-04-03T18:15:47Z",
"github_reviewed_at": "2025-04-04T14:09:40Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-79"
]
}